File name:

846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd

Full analysis: https://app.any.run/tasks/55abb816-9c0e-430f-8e1c-1446954ff48f
Verdict: Malicious activity
Analysis date: May 10, 2025, 02:36:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

25C67CD4286774B062A247F6701314A0

SHA1:

896C59759863E8AEAF1A9866BC16A326E2CC97BD

SHA256:

846B92D2FCAEEA4BA80C6DA91C3B101B88491E9E0427F6A958CE27D4B5B2F9BD

SSDEEP:

49152:1RnuBD7tSq0QcNj+NM2bm5JcxboHf2ZIfDdLc3LVd4Z/c5GdgCB2hgvRzpg5fVBc:buBftSXNj+NM2bm5JcxboHf2ZCDdLc3+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • isochronal.exe (PID: 2656)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Starts itself from another location

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Executes application which crashes

      • isochronal.exe (PID: 2236)
      • isochronal.exe (PID: 2656)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 2564)
  • INFO

    • Checks supported languages

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • isochronal.exe (PID: 2236)
    • The sample compiled with english language support

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Reads mouse settings

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • isochronal.exe (PID: 2236)
    • Create files in a temporary directory

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • isochronal.exe (PID: 2236)
    • Reads the machine GUID from the registry

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Creates files or folders in the user directory

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • WerFault.exe (PID: 2236)
      • WerFault.exe (PID: 6964)
    • Auto-launch of the file from Startup directory

      • isochronal.exe (PID: 2656)
    • Reads the software policy settings

      • slui.exe (PID: 6768)
    • Manual execution by a user

      • wscript.exe (PID: 2564)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:28 00:10:33+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 570880
InitializedDataSize: 859648
UninitializedDataSize: -
EntryPoint: 0x25f74
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
11
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe isochronal.exe svchost.exe no specs sppextcomobj.exe no specs slui.exe werfault.exe no specs wscript.exe no specs isochronal.exe svchost.exe no specs werfault.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2236C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2656 -s 752C:\Windows\SysWOW64\WerFault.exeisochronal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2236"C:\Users\admin\AppData\Local\epistemology\isochronal.exe" C:\Users\admin\AppData\Local\epistemology\isochronal.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\epistemology\isochronal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
2564wscript "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isochronal.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2656"C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe" C:\Users\admin\AppData\Local\epistemology\isochronal.exe
846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\epistemology\isochronal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
2656"C:\Users\admin\AppData\Local\epistemology\isochronal.exe" C:\Windows\SysWOW64\svchost.exeisochronal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
2960C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5352"C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe" C:\Windows\SysWOW64\svchost.exeisochronal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
6324C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6708"C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe" C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6768"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 424
Read events
4 424
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
11
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2236WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_isochronal.exe_e33cc3debcd9c692644fd1fbeccdfc64b7aef3_63cac8e7_b99ee1a5-28ab-47d2-8cef-f993ceb3afa6\Report.wer
MD5:
SHA256:
6964WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_isochronal.exe_e33cc3debcd9c692644fd1fbeccdfc64b7aef3_63cac8e7_4dd6294a-1507-4ad4-aa8c-94590de84216\Report.wer
MD5:
SHA256:
2236WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD449.tmp.dmpbinary
MD5:A6843C3C0B52157D070DDD8189BEF847
SHA256:7FA5C673D76E55AEBD29179827814392B2B522B65F3E5408736A3AE892F03C24
6964WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE997.tmp.dmpbinary
MD5:88823664E5A0CA54489D7EE420643BA6
SHA256:3770617756E17BE4E6A8BA4C2E8C9852CEDE5FF1C3F0E0B512313535FE5975D6
2656isochronal.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isochronal.vbsbinary
MD5:12DAC9A7D3B840571BE3AAC3E79BE473
SHA256:AFF201A4BB0F075D1520E97799BD17FEE6E76235B0204EE40ED4DBF6AE0B36FA
2656isochronal.exeC:\Users\admin\AppData\Local\Temp\autC016.tmpbinary
MD5:D97395808D0D77458EA36241E333A0C5
SHA256:2F75E5E47B0028B95139202CC0BB36D2D7795A19C875C998E57B1B4036F2C808
6708846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exeC:\Users\admin\AppData\Local\epistemology\isochronal.exeexecutable
MD5:25C67CD4286774B062A247F6701314A0
SHA256:846B92D2FCAEEA4BA80C6DA91C3B101B88491E9E0427F6A958CE27D4B5B2F9BD
6708846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exeC:\Users\admin\AppData\Local\Temp\unspawnedbinary
MD5:D97395808D0D77458EA36241E333A0C5
SHA256:2F75E5E47B0028B95139202CC0BB36D2D7795A19C875C998E57B1B4036F2C808
6708846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exeC:\Users\admin\AppData\Local\Temp\autBC0E.tmpbinary
MD5:D97395808D0D77458EA36241E333A0C5
SHA256:2F75E5E47B0028B95139202CC0BB36D2D7795A19C875C998E57B1B4036F2C808
6964WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREA63.tmp.WERInternalMetadata.xmlbinary
MD5:8D8AAE29D29DD0D4391D9F78F20C1231
SHA256:9F29D9FA1FEBDF6FE1FC728576E09B95A13CB9DE0B438B0910072B97AAB81F27
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
5984
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.21
  • 23.216.77.23
  • 23.216.77.25
whitelisted
google.com
  • 142.250.186.46
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.4
  • 40.126.31.130
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.71
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.22
whitelisted

Threats

No threats detected
No debug info